Like what you've read?

On Line Opinion is the only Australian site where you get all sides of the story. We don't
charge, but we need your support. Here�s how you can help.

  • Advertise

    We have a monthly audience of 70,000 and advertising packages from $200 a month.

  • Volunteer

    We always need commissioning editors and sub-editors.

  • Contribute

    Got something to say? Submit an essay.


 The National Forum   Donate   Your Account   On Line Opinion   Forum   Blogs   Polling   About   
On Line Opinion logo ON LINE OPINION - Australia's e-journal of social and political debate

Subscribe!
Subscribe





On Line Opinion is a not-for-profit publication and relies on the generosity of its sponsors, editors and contributors. If you would like to help, contact us.
___________

Syndicate
RSS/XML


RSS 2.0

The electronic 'me'

By Kevin Cox - posted Tuesday, 4 December 2007


Integrity of the system

It is to the advantage of an individual to have all connections in the one place and connected biometrically to themselves as it makes it very, very difficult for someone else to steal their identity. The only way for an electronic identity to be stolen is to physically kidnap or take control of the person.

Fraud through the attempted creation of multiple identities would not be possible as it would almost certainly be detected by biometric security procedures and by an individual's behaviour.

Audit procedures and independent checks of organisations looking after connections (the links between relationships) would further protect the integrity of such a system.

Advertisement

Does it need government legislation to come into existence?

A system as described here does not require any special legislation to become operational; in fact we have already built a system with these characteristics. It can be viewed at www.edentiti.com. This system can co-operate with other systems built in the same way and it is expected that over time many different Edentiti-type systems will interoperate. Individual organisations use the system for registration of customers who can prove who they are. As it reduces the cost of transactions, it is expected that such systems will ultimately prevail in the marketplace for identification.

Conclusion

The advantages of people retaining control of their own electronic identity information are great in terms of reduced costs, increased privacy and more open and secure transactions, making it an approach that is likely to prevail.  By adjusting the way we handle individual transactions we can attain our system goals of increased security and reduced costs while still having a free and open society.

  1. Pages:
  2. 1
  3. 2
  4. Page 3
  5. All


Discuss in our Forums

See what other readers are saying about this article!

Click here to read & post comments.

8 posts so far.

Share this:
reddit this reddit thisbookmark with del.icio.us Del.icio.usdigg thisseed newsvineSeed NewsvineStumbleUpon StumbleUponsubmit to propellerkwoff it

About the Author

Dr Kevin Cox is an entrepreneur. Previously he has taught Information Systems in Canberra and Hong Kong and worked with computers for various multinationals in Australia, the USA and Indonesia.

Other articles by this Author

All articles by Kevin Cox

Creative Commons LicenseThis work is licensed under a Creative Commons License.

Article Tools
Comment 8 comments
Print Printable version
Subscribe Subscribe
Email Email a friend
Advertisement

About Us Search Discuss Feedback Legals Privacy